Generally speaking, a subdomain like jellyfin.myhome.com
will work out much better than a subpath like myhome.com/jellyfin
.
Very few web apps can deal well (or at all) with being used under a subpath.
Generally speaking, a subdomain like jellyfin.myhome.com
will work out much better than a subpath like myhome.com/jellyfin
.
Very few web apps can deal well (or at all) with being used under a subpath.
It’s not. Series X and series S use native Bluetooth and work with xpadneo. Older controllers use their own proprietary receiver that needs to be plugged into the machine and work with regular xpad.
Probably a better idea would be to leave it archived. Whoever wants to take over can fork it and prove themselves by showing their work.
The xz debacle has shown that there are risk involved in an established developer endorsing an unknown one.
It will go through Google servers if you want to talk to an Android user… If Apple implemented RCS only for its own users there wouldn’t be much point to it. 🙂
You just need an app that does this transparently.
Oh wait, that’s why Google isn’t letting anybody else use RCS. 😄
I’d be more interested to know what they think iMessage is, if not a messaging app…
I’m fairly sure the only reason for which Apple is using RCS is to circumvent the EU DSA, which requires them to make iMessage interoperable with other chat systems. So instead of opening access to iMessage they’re using a completely different system as a distraction.
I mean, they could’ve said that iMessage is already interoperable via SMS but the feature disparity is too large. RCS will serve nicely to confuse the issue.
There’s otherwise nothing to gain for Apple by adopting RCS. iMessage already does everything RCS does and more.
They could also kill RCS tomorrow if they wanted to, by simply releasing iMessage for Android. But then they wouldn’t have a red herring to show the EU — if anything they’d be in an even worse position as per DSA. It would also antagonize Google although I’m not sure how much they care about that.
He’s not suggesting to replace timestamps (nor database sequences). They’re unique identifiers, and they happen to include a timestamp.
I can’t give specifics because it will depend on the version you play and also it’s been a while and I don’t remember all mods by heart. So it’s just gonna be suggestions; in no particular order:
On an even more personal note, I like to play like a classic RPG. I get mods that allow multiple companions and interesting NPCs and when I met somebody interesting I take them into my party. There are also mods that let you order them better, you can adjust their flags to set what armor and weapons they prefer, how they level up, and whether they have “plot armor” so they can die for reals. I usually end the game with a party of 4-6 people and it’s a blast. But you may want to adjust the difficulty accordingly as you go out you will start rolling everything.
Another very interesting approach I’ve tried a couple of times is mods that remove all identification clues (no town names, no directions, maximum map fog of war) and start you in some random point of the map. Add some difficulty mods so you have to be really careful who you meet, perhaps some survival mods, and it’s a real blast. You can also use rogue rules and restart when you die (and not save scum).
Hence the controversy! 🙂
Also, Graphene tend to act superior about it and it pisses people off.
They claim their security measures are better then other custom ROMs.
Just a note, the US military completed the phase-out of floppy disks in 2019.
Bold of you to assume Ubuntu was a recent version.
Don’t worry, Ubuntu was probably Lucid. 🤭
Medical environments are notorious for inept tech skills and slow technology adoption.
SIMs are standalone embedded computers (they run Java!) that handle the cellular connections one their own and communicate with the phone over a standard pin-out and protocol.
This way the phones are somewhat insulated from advances in cellular technology and it’s one of the reasons mobile phones have been able to evolve so smoothly from feature phones to smart phones.
But nobody uses /dev/sdX anymore (not after they wipe the wrong disk once anyway). They either use logical UUIDs or hardware WWN/serial.
If you were 100% specific you would be effectively writing the code yourself. But you don’t want that, so you’re not 100% specific, so it makes up the difference. The result will include an unspecified percentage of code that does not fit what you wanted.
It’s like code Yahtzee, you keep re-rolling this dice and that dice but never quite manage to get the exact combination you need.
There’s an old saying about computers, they don’t do what you want them to do, they do what you tell them to do. They can’t do what you don’t tell them to do.
Oh, God, he’s trying to use pointers again. He can never get them right. And they say I’m supposed to chase my tail…
If you mean to do that in the public DNS records please note that public records that point at private IPs are often filtered by ISP’s DNS servers because they can be used in web attacks.
If you don’t use your ISP’s DNS as upstream, and the servers you use don’t do this filtering, and you don’t care about the attacks, carry on. But if you use multiple devices or have multiple users (with multiple devices each) eventually that domain will be blocked for some of them.